To see the other types of publications on this topic, follow the link: BYOT.

Journal articles on the topic 'BYOT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'BYOT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.

Full text
Abstract:
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.
APA, Harvard, Vancouver, ISO, and other styles
2

Earley, Seth, Robert Harmon, Maria R. Lee, and Sunil Mithas. "From BYOD to BYOA, Phishing, and Botnets." IT Professional 16, no. 5 (September 2014): 16–18. http://dx.doi.org/10.1109/mitp.2014.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prieto-González, Lisardo, Ricardo Colomo-Palacios, Beatriz Puerta, and Gerrit Tamm. "ModEAS." International Journal of Human Capital and Information Technology Professionals 5, no. 2 (April 2014): 52–61. http://dx.doi.org/10.4018/ijhcitp.2014040105.

Full text
Abstract:
Mobile technologies and more precisely apps have disrupted technology scenario. Bring your own application (BYOA) is a new trend that has emerged after the “bring your own device” (BYOD) vogue. However, and in spite of its intrinsic benefits, the trend presents also several caveats and Enterprise app stores are seen as a way to tackle these risks. In this paper, authors present ModEAS, a system designed to serve as a modular and scalable architecture when developing a middle scale or personal Enterprise app store.
APA, Harvard, Vancouver, ISO, and other styles
4

Junk, Günter, and Mathias Widler. "BYOD." Digitale Welt 2, no. 2 (March 7, 2018): 49–52. http://dx.doi.org/10.1007/s42354-018-0076-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walker-Osborn, C., S. Mann, and V. Mann. "to Byod or ... not to Byod." ITNOW 55, no. 1 (February 26, 2013): 38–39. http://dx.doi.org/10.1093/itnow/bws142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gaff, Brian M. "BYOD? OMG!" Computer 48, no. 2 (February 2015): 10–11. http://dx.doi.org/10.1109/mc.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bisson, Terry. "BYOB FAQ." Nature 449, no. 7163 (October 2007): 754. http://dx.doi.org/10.1038/449754a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, J. Morris, Pao-Chung Ho, and Teng-Chang Chang. "Securing BYOD." IT Professional 16, no. 5 (September 2014): 9–11. http://dx.doi.org/10.1109/mitp.2014.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.

Full text
Abstract:
<p class="IndexTerms">The concern of companies to keep sensitive data protected from improper access and information leaking has grown a lot. The constant cases of industrial espionage and information leakage regarding companies are an evidence of the need to apply strict information security policies, improve data protection and allow an auditing track. With the evolution of technology, the usage of personal mobile devices increased in organizations (BYOD - Bring Your Own Device), which allows the employees to use their own mobile devices at work. This paper addresses the current challenges faced by IT companies and teams in protecting access to this kind of information, and what strategies are used to mitigate, to track leaks, and reduce the misuse of documents in the organization. Considering the scenario evaluated, a framework with good Information Security practices based on the ISO 27002:2005 and the practical controls of the Center of Internet Security (CIS) is proposed, associating good practices with the needs of BYOD’s culture. The framework suggested in this paper reinforces the necessity for a standardization of the rules of information security in the process of adoption of BYOD’s culture, following the life cycle of the user with his personal mobile device in the company.</p><p class="IndexTerms"> </p><p class="IndexTerms"> </p>
APA, Harvard, Vancouver, ISO, and other styles
10

Köffer, Sebastian, Kevin Ortbach, Iris Junglas, Björn Niehaves, and Jeanne Harris. "Innovation Through BYOD?" Business & Information Systems Engineering 57, no. 6 (May 27, 2015): 363–75. http://dx.doi.org/10.1007/s12599-015-0387-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bello, Abubakar Garba, David Murray, and Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments." Information & Computer Security 25, no. 4 (October 9, 2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.

Full text
Abstract:
Purpose This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments. Design/methodology/approach This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments. Findings This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD. Research limitations/implications The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices. Originality/value This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.
APA, Harvard, Vancouver, ISO, and other styles
12

Vorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, and Visut Savangsuk. "A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.

Full text
Abstract:
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.
APA, Harvard, Vancouver, ISO, and other styles
13

Idris, Moh. "PEMILIHAN SOLUSI PENERAPAN BRING YOUR OWN DEVICE (BYOD) BERDASARKAN KONTROL KEAMANANNYA." Jurnal Ilmiah Matrik 21, no. 3 (December 19, 2019): 214–22. http://dx.doi.org/10.33557/jurnalmatrik.v21i3.724.

Full text
Abstract:
Abstract : The term BYOD (Bring Your Own Device) refers to the use of employees' personal devices (for example smartphones, tablets, laptops, netbooks) to do their work and manage corporate data from anywhere at any time. BYOD has been widely applied in the business world, hospitals, and education. With the ease that can be achieved by using BYOD, the security aspect is very important to consider. It starts with the security of the device to the security of company data that can be accessed by employees. Five dimensions of security control that must be considered in implementing BYOD: 1) data control; 2) access control; 3) network access control; 4) device management; 5) create a supporting framework. With the five BYOD implementation solutions presented in this study, there is only one solution that accommodates the five dimensions of BYOD security control, the use of Mobile Device Management (MDM) technology.
APA, Harvard, Vancouver, ISO, and other styles
14

Kabachinski, Jeff. "From COWs to BYOD." Biomedical Instrumentation & Technology 47, no. 3 (May 1, 2013): 254–58. http://dx.doi.org/10.2345/0899-8205-47.3.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Thomson, Gordon. "BYOD: enabling the chaos." Network Security 2012, no. 2 (February 2012): 5–8. http://dx.doi.org/10.1016/s1353-4858(12)70013-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Beckett, Phil. "BYOD – popular and problematic." Network Security 2014, no. 9 (September 2014): 7–9. http://dx.doi.org/10.1016/s1353-4858(14)70090-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shepherdson, Mark. "BYOD – the biometric implications." Biometric Technology Today 2013, no. 4 (April 2013): 5–7. http://dx.doi.org/10.1016/s0969-4765(13)70074-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Roberti, M. Julia, Luciana Giordano, Thomas M. Jovin, and Elizabeth A. Jares‐Erijman. "FRET Imaging bykt/kf." ChemPhysChem 12, no. 3 (January 27, 2011): 563–66. http://dx.doi.org/10.1002/cphc.201000925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Junk, Günter. "BYOD im öffentlichen Sektor." Innovative Verwaltung 39, no. 10 (October 2017): 38–40. http://dx.doi.org/10.1007/s35114-017-0121-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Modrow, Eckart. "Objektorientiertes Programmieren mit BYOB." LOG IN 31, no. 4 (July 2012): 62–70. http://dx.doi.org/10.1007/bf03323760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ophoff, Jacques, and Steve Miller. "Business Priorities Driving BYOD Adoption: A Case Study of a South African Financial Services Organization." Issues in Informing Science and Information Technology 16 (2019): 165–96. http://dx.doi.org/10.28945/4303.

Full text
Abstract:
Aim/Purpose: Bring your own device (BYOD) provides opportunities for both the organization and employees, but the adoption of BYOD also introduces risks. This case study of an organization’s BYOD program identifies key positive and negative influences on the adoption decision. Background: The consumerization of IT introduced the BYOD phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organizational systems to perform their work tasks. Such devices include smartphones, tablets and laptop computers. Methodology: This research uses a case study approach to investigate how business priorities drive the adoption of BYOD and how resulting benefits and risks are realized and managed by the organization. Primary empirical data was collected using semi-structured interviews with 15 senior employees from a large South African financial services organization. Policy documents from the organization were analyzed as secondary data. Contribution: Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practices. Findings: The themes were analyzed using the Technology-Organization-Environment (TOE) framework, showing the key positive and negative influences on the adoption decision. Recommendations for Practitioners: Organizations need to clearly understand the reasons they want to introduce BYOD in their organizations. The conceptual framework can be applied by practitioners in their organizations to achieve their BYOD business objectives. Recommendations for Researchers: BYOD remains an important innovation for organizations with several aspects worthy of further study. The TOE framework presents a suitable lens for analysis, but other models should also be considered. Impact on Society: The findings show that organizations can use BYOD to improve client service, gain competitive advantage, and improve their processes using their digital devices and backend systems. The BYOD trend is thus not likely to go away anytime soon. Future Research: The applicability of findings should be validated across additional contexts. Additional models should also be used.
APA, Harvard, Vancouver, ISO, and other styles
22

Moreira, Ailton, Carlos Filipe da Silva Portela, and Manuel Filipe Santos. "Bring Your Own Device in Healthcare." International Journal of Privacy and Health Information Management 7, no. 2 (July 2019): 1–13. http://dx.doi.org/10.4018/ijphim.2019070101.

Full text
Abstract:
Bring your own device (BYOD) policies have become a very popular topic in information technology, as this approach allows employees to bring their devices into their organizations and use them to access information. This trend has some benefits both for the organization and to employees. This paper aims to identify those benefits as well as the advantages and disadvantages of BYOD usage in organizations. In addition, SWOT analysis of BYOD usage is presented and discussed. Finally, it is introduced as an approach to BYOD in healthcare. Utilizing personal devices at work is beneficial to organizational employees as they are in some way satisfied, and they have more freedom and choice to use their devices. This can easily lead the employees to be more productive and flexible. Organizations who embrace BYOD policies have noticed that their employees are happier, more productive, and more collaborative.
APA, Harvard, Vancouver, ISO, and other styles
23

Ofusori, Lizzy Oluwatoyin, and Prabhakar Rontala Subramaniam. "The Influence of Technical and Social Factors in Mitigating Threats in a BYOD-Enabled Environment." International Journal of Information Systems in the Service Sector 13, no. 1 (January 2021): 1–30. http://dx.doi.org/10.4018/ijisss.2021010101.

Full text
Abstract:
As the adoption of bring your own device (BYOD) phenomenon by businesses and other sectors continues to grow. Employees find it desirable to use their personally owned mobile devices for work without the need to differentiate between their carrier services and their organizations' network. However, this practice makes such businesses vulnerable to various security threats. Nigeria banking institutions, like other businesses globally, have adopted the BYOD phenomenon. However, BYOD trend constitutes heterogeneity, and there is large diversity in mobile devices, hence the risk of corporate data being exposed to threats increases. Thus, this paper investigates the influence of technical and social threats as it relates to BYOD phenomenon in the banking institutions. Data was collected from the employees of four banks in Nigeria that supported BYOD trend. The study found out that there are some security threats that are integrated, and the existing security measures are not sufficient to mitigate those threats. Hence, this study has presented an integrated solution to curb these threats.
APA, Harvard, Vancouver, ISO, and other styles
24

Yusri Jusoh, Mohd, Haryani Haron, and Jasber Kaur. "The Transformation of Byod Practices to Support Green Computing in Malaysia Public Sector." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 361. http://dx.doi.org/10.14419/ijet.v7i3.20.19273.

Full text
Abstract:
Bring your own Device (BYOD) is currently heightened as an approach towards green computing. With the current usage of mobile devices such as the smart phones, tablets, and laptops as the necessity in the working environment, the concept of BYOD went beyond personal use towards workplace. This study explores the BYOD practices and the contributions to support green computing in Malaysia public sector. Theoretical in this study were tested through a study in selected ministry in Malaysia. Qualitative research approach is used in the study with the main data collection method of interviews and document analysis. The study discovered two models of BYOD approach in the Malaysian public sector, which are the personally owned devices model and the organization owned devices model. This study concludes that both models can support green computing in Malaysia public sector; however no policy related to processes procedure of BYOD that can be used as guideline for green IT practices.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Lixuan Zhang, Matthew Mouritsen, and Jeffrey R. Miller. "Role of Perceived Value in Acceptance of “Bring Your Own Device” Policy." Journal of Organizational and End User Computing 31, no. 2 (April 2019): 65–82. http://dx.doi.org/10.4018/joeuc.2019040104.

Full text
Abstract:
IT consumerization refers to the phenomenon of using personal devices and applications for work-related tasks. Considered as a major wave of employee-driven innovation, many organizations have adopted IT consumerization to reap its benefits. Bring-your-own-device (BYOD) is a major form of IT consumerization. This study examines the perceptions of BYOD among business students and professionals. Utilizing a perceived value approach, a survey was designed to examine how the benefits and sacrifices of BYOD influence its perceived value. Through survey data collected from 217 business students and 200 full time working professionals, the study finds that job flexibility control, technology empowerment, and enjoyment are positively related to the perceived value of BYOD.
APA, Harvard, Vancouver, ISO, and other styles
26

Jusoh, Mohd Yusri, Haryani Haron, and Jasber Kaur. "Work Process of Bring Your Own Device to Support Green Computing." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 1 (July 1, 2018): 137. http://dx.doi.org/10.11591/ijeecs.v11.i1.pp137-143.

Full text
Abstract:
Bring Your Own Device (BYOD) is a new approach to optimize the use of Information Technology (IT) devices to carry out their work task. The study of BYOD is focused on work activities that perform by IT worker using IT device in public sector. Work activities can provide important insights into IT device portfolio development, end-user segmentation process and the role of IT workers in public sector. The propose of this study is to explore work process of bringing your own devices to support green computing. A conceptual framework of BYOD work process in public sector through integration of IT devices and end-user segmentation to support green computing was developed based on systematic literature review to highlight the implementation of BYOD. This framework considers that work activities based on IT worker, IT device portfolio and end-user segmentation are the main key for public sector to support green computing. This framework is an initial research for researchers and practitioners to further examine BYOD practices in public sector. In addition, to highlight an important gap, this paper explains how different work activities using different IT device influence the IT worker to select the suitable IT device for BYOD that support green computing.
APA, Harvard, Vancouver, ISO, and other styles
27

Yuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.

Full text
Abstract:
The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.
APA, Harvard, Vancouver, ISO, and other styles
28

Wani, Tafheem Ahmad, Antonette Mendoza, and Kathleen Gray. "Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature." JMIR mHealth and uHealth 8, no. 6 (June 18, 2020): e18175. http://dx.doi.org/10.2196/18175.

Full text
Abstract:
Background As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations. Objective Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. Methods A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman’s People Policy Technology model, promoting a holistic understanding of hospitals’ BYOD security issues and solutions. Results A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data. Conclusions The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Chong Qing, X. A. Mei, M. Chen, and J. Liu. "Ferroelectric Properties of Bi4-xYbxTi3O12 Thin Films." Key Engineering Materials 591 (November 2013): 216–19. http://dx.doi.org/10.4028/www.scientific.net/kem.591.216.

Full text
Abstract:
Yb-doped bismuth titanate and random oriented Bi4-xYbxTi3O12 (BYbT) thin films were fabricated on Pt/Ti/SiO2/Si substrate with pulsed laser deposition method. The structures and ferroelectric properties of the BYbT films were investigated. Yb doping resulted in a marked improvement in remanent polarization (Pr) and coercive field (Ec). At an applied electric field of 120kV/cm, the Pr and (Ec) of the BYbT (x=0.8) films annealed at 650°C were 20 μC/cm2 and 85 KV/cm, respectively.
APA, Harvard, Vancouver, ISO, and other styles
30

Smith, William P. "“Can we borrow your phone? Employee privacy in the BYOD era”." Journal of Information, Communication and Ethics in Society 15, no. 4 (November 13, 2017): 397–411. http://dx.doi.org/10.1108/jices-09-2015-0027.

Full text
Abstract:
Purpose This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future. Design/methodology/approach Based on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed. Findings Primarily due to property rights, employers in the USA have heretofore been granted wide latitude in monitoring employee communications. The BYOD trend has the potential to challenge this status quo. Originality value BYOD programs present discernable threats to employee privacy. Attention is also directed toward contributing elements such as wearable technology, cloud computing and company cultures.
APA, Harvard, Vancouver, ISO, and other styles
31

Cristol, Dean, and Belinda Gimbert. "Academic Achievement in BYOD Classrooms." QScience Proceedings 2013, no. 3 (October 7, 2013): 15. http://dx.doi.org/10.5339/qproc.2013.mlearn.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Iskierka, Sławomir, Janusz Krzemiński, and Zbigniew Weżgowiec. "Technologia BYOD w polskich szkołach." Dydaktyka Informatyki 10, no. 1 (2015): 80–89. http://dx.doi.org/10.15584/di.2015.10.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Podgórski, Grzegorz. "Bezpieczeństwo informacji w modelu BYOD." Nierówności społeczne a wzrost gospodarczy 53, no. 1 (2018): 180–92. http://dx.doi.org/10.15584/nsawg.2018.1.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Albova, A. "NEW SAFETY IN BYOD STYLE." LastMile 68, no. 7 (2017): 42–46. http://dx.doi.org/10.22184/2070-8963.2017.68.7.42.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tokuyoshi, Brian. "The security implications of BYOD." Network Security 2013, no. 4 (April 2013): 12–13. http://dx.doi.org/10.1016/s1353-4858(13)70050-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Disterer, Georg, and Carsten Kleiner. "BYOD Bring Your Own Device." Procedia Technology 9 (2013): 43–53. http://dx.doi.org/10.1016/j.protcy.2013.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Vignesh, U., and S. Asha. "Modifying Security Policies Towards BYOD." Procedia Computer Science 50 (2015): 511–16. http://dx.doi.org/10.1016/j.procs.2015.04.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Deba, Suman, Himanshu Singh, Behara Lakshmi Rohini, Dheeraj Mishra, Rohit Kumar Meena, and Paritosh Bhattacharya. "BYOD Supported Crowd Interaction System." Procedia Computer Science 132 (2018): 1586–91. http://dx.doi.org/10.1016/j.procs.2018.05.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Saha, Subham, and Suman Deb. "BYOD Supported Multimodal Classroom Interaction." Procedia Computer Science 167 (2020): 1533–42. http://dx.doi.org/10.1016/j.procs.2020.03.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Romer, Hormazd. "Best practices for BYOD security." Computer Fraud & Security 2014, no. 1 (January 2014): 13–15. http://dx.doi.org/10.1016/s1361-3723(14)70007-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hudson, Suzanne. "BYOC (Bring-Your-Own-Craft)." Journal of Modern Craft 13, no. 3 (September 1, 2020): 365–68. http://dx.doi.org/10.1080/17496772.2020.1843791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Disterer, Georg, and Carsten Kleiner. "Using Mobile Devices with BYOD." International Journal of Web Portals 5, no. 4 (October 2013): 33–45. http://dx.doi.org/10.4018/ijwp.2013100103.

Full text
Abstract:
Using mobile devices like smartphones and tablets offers many advantages and has become very popular in private life. Using them in the workplace is also popular, but nobody wants to carry around and handle two devices: one for personal use, and one for work-related tasks. Therefore “Bring Your Own Device” (BYOD) may be appropriate: users make their personal devices available for company use. Apart from improved convenience this also incurs additional opportunities and risks for companies at the same time. We describe and discuss organizational issues, technical approaches, and solutions.
APA, Harvard, Vancouver, ISO, and other styles
43

Miller, Keith W., Jeffrey Voas, and George F. Hurlburt. "BYOD: Security and Privacy Considerations." IT Professional 14, no. 5 (September 2012): 53–55. http://dx.doi.org/10.1109/mitp.2012.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Disterer, Georg, and Carsten Kleiner. "BYOD — Bring Your Own Device." HMD Praxis der Wirtschaftsinformatik 50, no. 2 (April 2013): 92–100. http://dx.doi.org/10.1007/bf03340800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Parham, Abbie Gail, J. Lowell Mooney, and Timothy D. Cairney. "When BYOD Meets Big Data." Journal of Corporate Accounting & Finance 26, no. 5 (June 13, 2015): 21–27. http://dx.doi.org/10.1002/jcaf.22059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ali, Md Iman, and Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.

Full text
Abstract:
Intel’s “Bring Your Own Device” (BYOD) adoption quickly became popular as an alternative workplace solution strategy. It enables employees to use their personally owned devices to perform business activities, leading to increased productivity and employee satisfaction. However, BYOD also brought associated risks because of exponential growth in the number of cybersecurity incidents due to which business ecosystem gets disrupted and fragmented. Although several methods and mechanisms have been developed and adopted to mitigate the risk associated with BYOD, they still represent a challenge as corporate network gets exposed to inherent threats caused by the BYOD threat landscape. This work demonstrates especially two key aspects: The first focuses on how to detect and protect BYOD environment from an advanced level attack which cannot be detected by traditional tools and techniques even though available tools are quite effective. Before the attack and damage to the critical infrastructure due to BYOD threat, a strategy was indeed the key requirement for detecting attacks and protecting the environment. The second part of the research focuses on conducting forensic investigation model and developing a new approach by providing a reliable forensic investigation infrastructure to find digital evidence and detect the source of attack. This research work concluded with two different novel strategic ideas. The first part contributes to a new method of detecting and protecting against malicious activities which cannot be otherwise detected and protected by traditional security technology like IPS, IDS, AntiBot, or AntiVirus. The proposed technique compared to the existing methods led to a significant contribution to the identification of threats before an attack takes place. The second part of the research contributes to the defining of a new approach of the next-generation digital forensic readiness (NG-DFR) model in order to build a cyber forensic ecosystem so that cyber secured BYOD environment can be enabled safely.
APA, Harvard, Vancouver, ISO, and other styles
47

Doargajudhur, Melina Seedoyal, and Peter Dell. "Impact of BYOD on organizational commitment: an empirical investigation." Information Technology & People 32, no. 2 (April 1, 2019): 246–68. http://dx.doi.org/10.1108/itp-11-2017-0378.

Full text
Abstract:
PurposeBring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.Design/methodology/approachSurvey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.FindingsThe SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.Practical implicationsThe findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.Originality/valueThe expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.
APA, Harvard, Vancouver, ISO, and other styles
48

БАЖМІНА, Евеліна. "ВИКОРИСТАННЯ BYOD ТЕХНОЛОГІЙ В ОСВІТНЬОМУ ПРОЦЕСІ." Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 3 (December 2020): 27–40. http://dx.doi.org/10.31494/2412-9208-2020-1-3-27-40.

Full text
Abstract:
У статті розкрито проблеми застосування BYOD технологій в освітньому процесі. Надшвидкісний розвиток цифрових технологій впливає на сучасне суспільство, вносячи певні зміни в культуру не тільки соціальної сфери та побуту, а й освіти. У статті представлена схема цифрових технологій в освіті. Досліджено значення дефініцій «цифрові технології», «цифровий пристрій», «цифрове освітнє середовище», «цифрове навчання», «цифрова компетентність». Цифрове освітнє середовище дає можливість персоналізувати систему навчання. На основі експерименту, проведеного серед студентів першого курсу Національного університету «Запорізька політехніка», встановлено технічні можливості смартфонів студентів. Розкрито витоки походження терміну «BYOD». Визначено, що BYOD означає використання персонального цифрового обладнання для навчання, відповідальність за нього несе власник, який зацікавлений у його безперервній роботі. З’ясовано, що цифрові технології надають викладачам аналіз успішності кожного студента в реальному часі, забезпечують миттєвий зворотний зв’язок і можливість надати допомогу в усуненні прогалин у досягненнях студентів; студентам – покращення спілкування, розвивання співпраці та мотивації, зростання успішності та, як підсумок, сприяння формуванню культури самостійної роботи. Важливим чинником для успішної педагогічної діяльності викладача є врахування психологічних особливостей студентів «покоління Z». Розглянуто проблему сприйняття та несприйняття використання технології BYOD всіма учасниками навчального процесу. Ключові слова: цифрові технології; цифрове навчання; цифрове освітнє середовище; цифрова компетентність; технології BYOD; «покоління Z».
APA, Harvard, Vancouver, ISO, and other styles
49

Baillette, Paméla, and Yves Barlette. "BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs." Journal of Organizational Change Management 31, no. 4 (July 2, 2018): 839–51. http://dx.doi.org/10.1108/jocm-03-2017-0044.

Full text
Abstract:
Purpose The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs). Design/methodology/approach A theoretical approach is proposed in this paper. As technology is an important driver of organizational change, technological innovations entail new work practices and in turn lead to a twofold “security paradox.” Findings This paper introduces the stakes and issues associated with BYOD-related mobile technologies. Evidence is provided that this phenomenon must be cautiously addressed to not only seize related benefits but also reduce related risks. Avenues for future research are offered to complement this work. Practical implications The main practical interest is to make entrepreneurs of SMEs and their employees aware of the BYOD phenomenon and its related risks and benefits. Originality/value From a theoretical perspective, very little work has been published in the field of management sciences about the benefits and dangers associated with the introduction of BYOD among entrepreneurs and employees in SMEs. Moreover, this study identifies a twofold “security paradox” related to information security that has never been studied in work settings.
APA, Harvard, Vancouver, ISO, and other styles
50

Stąpór, Paweł, and Dariusz Laskowski. "Bring Your Own Device - Providing Reliable Model of Data Access." Journal of KONBiN 39, no. 1 (October 1, 2016): 41–56. http://dx.doi.org/10.1515/jok-2016-0031.

Full text
Abstract:
Abstract The article presents a model of Bring Your Own Device (BYOD) as a model network, which provides the user reliable access to network resources. BYOD is a model dynamically developing, which can be applied in many areas. Research network has been launched in order to carry out the test, in which as a service of BYOD model Work Folders service was used. This service allows the user to synchronize files between the device and the server. An access to the network is completed through the wireless communication by the 802.11n standard. Obtained results are shown and analyzed in this article.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography